502 research outputs found

    Non Co-Operative Detection of LPI/LPD Signals Via Cyclic Spectral Analysis

    Get PDF
    This research proposes and evaluates a novel technique for detecting LPI/LPD communication signals using a digital receiver primarily designed to detect radar signals, such as a Radar Warning Receiver (RWR) or an Electronic Support Measures (ESM) receiver. The proposed Cyclic Spectrum Analysis (CSA) receiver is a robust detector that takes advantage of the spectral correlation properties of second-order cyclostationary signals. A computationally efficient algorithm is used to estimate the Spectral Correlation Function (SCF). Using state-of-the-art FFT processing, it is expected that the proposed CSA receiver architecture could estimate the entire cyclic spectrum m approximately 0.6 ms. The estimate is then reduced to an energy related test statistic that is valid for all cycle frequencies within the receiver bandwidth. By producing an estimate of the cyclic spectrum, the CSA receiver also benefits post-detection tasks such as signal classification and exploitation. As modeled, the ideal CSA receiver detection performance is within 1.0 dB of the radiometer in benign signal environments and consistently outperforms the radiometer in adverse signal environments. The effect on detection performance when the CSA receiver is implemented with channelized and quadrature digital receiver architectures is also examined

    Concurrent codes:a holographic-type encoding robust against noise and loss

    Get PDF
    Concurrent coding is an encoding scheme with 'holographic' type properties that are shown here to be robust against a significant amount of noise and signal loss. This single encoding scheme is able to correct for random errors and burst errors simultaneously, but does not rely on cyclic codes. A simple and practical scheme has been tested that displays perfect decoding when the signal to noise ratio is of order -18dB. The same scheme also displays perfect reconstruction when a contiguous block of 40% of the transmission is missing. In addition this scheme is 50% more efficient in terms of transmitted power requirements than equivalent cyclic codes. A simple model is presented that describes the process of decoding and can determine the computational load that would be expected, as well as describing the critical levels of noise and missing data at which false messages begin to be generated

    Jamming Cognitive Radios

    Get PDF
    The goal of this thesis is to identify and evaluate weaknesses in the rendezvous process for Cognitive Radio Networks (CRNs) in the presence of a Cognitive Jammer (CJ). Jamming strategies are suggested and tested for effectiveness. Methods for safe- guarding the Cognitive Radios (CRs) against a CJ are also explored. A simulation is constructed to set up a scenario of two CRs interacting with a CJ. Analysis of the simulation is conducted primarily at the waveform level. A hardware setup is constructed to analyze the system in the physical layer, verify the interactions from the simulation, and test in a low signal-to-interference and noise ratio (SINR) environment. The hardware used in this thesis is the Wireless Open-Access Research Platform. Performance metrics from open literature and independent testing are compared against those captured from the jamming tests. The goal of testing is to evaluate and quantify the ability to delay the rendezvous process of a CRN. There was some success in delaying rendezvous, even in a high SINR environment. Jamming strategies include a jammer that repeats an observed channel-hopping pattern, a jammer with random inputs using the same algorithm of the CRs, a jammer that estimates channel-hopping parameters based on observations, and a random channel-hopping jammer. Results were compared against control scenarios, consisting of no jamming and a jammer that is always jamming on the same channel as one of the CRs. The repeater, random inputs to the CR algorithm, observation-based estimation jammer, and the random channel hopping jammer were mildly successful in delaying rendezvous at about 0%, 9%, 0%, and 1%, respectively. The jammer that is always on the same channel as a CR had an overall rendezvous delay about 13% of the time

    EM threat analysis for wireless systems.

    Full text link

    A Comprehensive Survey on the Cyber-Security of Smart Grids: Cyber-Attacks, Detection, Countermeasure Techniques, and Future Directions

    Full text link
    One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks based on the security requirements, confidentiality, integrity, and availability, without taking into consideration the accountability requirement. In addition, some of these surveys focused on the Transmission Control Protocol/Internet Protocol (TCP/IP) model, which does not differentiate between the application, session, and presentation and the data link and physical layers of the Open System Interconnection (OSI) model. In this survey paper, we provide a classification of attacks based on the OSI model and discuss in more detail the cyber-attacks that can target the different layers of smart grid networks communication. We also propose new classifications for the detection and countermeasure techniques and describe existing techniques under each category. Finally, we discuss challenges and future research directions
    corecore